CVE-2004-0905

Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows remote attackers to perform cross-domain scripting and possibly execute arbitrary code by convincing a user to drag and drop javascript: links to a frame or page in another domain.
References
Link Resource
http://bugzilla.mozilla.org/show_bug.cgi?id=250862 Patch Vendor Advisory
http://marc.info/?l=bugtraq&m=109698896104418&w=2
http://marc.info/?l=bugtraq&m=109900315219363&w=2
http://security.gentoo.org/glsa/glsa-200409-26.xml Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/651928 Patch Third Party Advisory US Government Resource
http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3 Vendor Advisory
http://www.novell.com/linux/security/advisories/2004_36_mozilla.html Patch Vendor Advisory
http://www.securityfocus.com/bid/11177 Exploit Patch Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA04-261A.html Patch Third Party Advisory US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/17374
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10378
http://bugzilla.mozilla.org/show_bug.cgi?id=250862 Patch Vendor Advisory
http://marc.info/?l=bugtraq&m=109698896104418&w=2
http://marc.info/?l=bugtraq&m=109900315219363&w=2
http://security.gentoo.org/glsa/glsa-200409-26.xml Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/651928 Patch Third Party Advisory US Government Resource
http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3 Vendor Advisory
http://www.novell.com/linux/security/advisories/2004_36_mozilla.html Patch Vendor Advisory
http://www.securityfocus.com/bid/11177 Exploit Patch Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA04-261A.html Patch Third Party Advisory US Government Resource
https://exchange.xforce.ibmcloud.com/vulnerabilities/17374
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10378
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.1:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.1:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:alpha:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4:beta:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.5:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.6:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7:rc3:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:mozilla:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:netscape:navigator:7.0:*:*:*:*:*:*:*
cpe:2.3:a:netscape:navigator:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:netscape:navigator:7.1:*:*:*:*:*:*:*
cpe:2.3:a:netscape:navigator:7.2:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.3:*:i686:*:*:*:*:*
cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://bugzilla.mozilla.org/show_bug.cgi?id=250862 - Patch, Vendor Advisory () http://bugzilla.mozilla.org/show_bug.cgi?id=250862 - Patch, Vendor Advisory
References () http://marc.info/?l=bugtraq&m=109698896104418&w=2 - () http://marc.info/?l=bugtraq&m=109698896104418&w=2 -
References () http://marc.info/?l=bugtraq&m=109900315219363&w=2 - () http://marc.info/?l=bugtraq&m=109900315219363&w=2 -
References () http://security.gentoo.org/glsa/glsa-200409-26.xml - Patch, Vendor Advisory () http://security.gentoo.org/glsa/glsa-200409-26.xml - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/651928 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/651928 - Patch, Third Party Advisory, US Government Resource
References () http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3 - Vendor Advisory () http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3 - Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2004_36_mozilla.html - Patch, Vendor Advisory () http://www.novell.com/linux/security/advisories/2004_36_mozilla.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/11177 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/11177 - Exploit, Patch, Vendor Advisory
References () http://www.us-cert.gov/cas/techalerts/TA04-261A.html - Patch, Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA04-261A.html - Patch, Third Party Advisory, US Government Resource
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17374 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17374 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10378 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10378 -

Information

Published : 2004-09-14 04:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0905

Mitre link : CVE-2004-0905

CVE.ORG link : CVE-2004-0905


JSON object : View

Products Affected

redhat

  • linux
  • fedora_core
  • enterprise_linux
  • enterprise_linux_desktop
  • linux_advanced_workstation

mozilla

  • mozilla
  • firefox

suse

  • suse_linux

netscape

  • navigator

conectiva

  • linux